CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:P/I:P/A:P
EPSS
Percentile
99.5%
Mozilla Firefox is the next-generation web browser from the Mozilla project.
Martijn Wargers and Nick Mott discovered a vulnerability when rendering malformed JavaScript content. The Mozilla Firefox 1.0 line is not affected.
If JavaScript is enabled, by tricking a user into visiting a malicious web page which would send a specially crafted HTML script that contains references to deleted objects with the “designMode” property enabled, an attacker can crash the web browser and in theory manage to execute arbitrary code with the rights of the user running the browser.
There is no known workaround at this time.
All Mozilla Firefox 1.5 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.5.0.3"
All Mozilla Firefox 1.5 binary users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.5.0.3"
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Gentoo | any | all | www-client/mozilla-firefox | < 1.5.0.3 | UNKNOWN |
Gentoo | any | all | www-client/mozilla-firefox-bin | < 1.5.0.3 | UNKNOWN |